Making software secure is harder, but the work of the TCPA is designed to start with a foundation of hardware security and then build software security on top of that. If you have a box you can't tamper with then it can run software you can't pirate, because only the box has the keys to run the software. UTMs have nothing to say about this.

This article is totally bogus, claiming mathematical certainty when its claims are completely unsupported. The author owes an apology to the gentlement he was addressing.

1

Stefan Jones

03-06-2002

04:04 PM ET (US)

Heinlein nailed that one. But he's being a bit naive. All those years of profits mean you can buy off the lawmakers.